--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T14:59:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a1fad51b-8f37-403a-832a-11358452fa6f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:59:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:35:39Z" name: builder-dockercfg-lc4nn namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: a1fad51b-8f37-403a-832a-11358452fa6f resourceVersion: "43415" uid: cf916568-3c83-4da4-97de-9859d9f9d181 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T14:59:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a98b76a1-514f-43e6-b5f1-2ae2c3f2cadf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:59:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:35:35Z" name: default-dockercfg-kfj7j namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a98b76a1-514f-43e6-b5f1-2ae2c3f2cadf resourceVersion: "43265" uid: 25a30c4f-ddde-493b-b0bf-ee0da11a676e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T14:59:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1b974ded-dd9a-4739-aa22-0be61ebc6399"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:59:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:35:39Z" name: deployer-dockercfg-dp2jr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1b974ded-dd9a-4739-aa22-0be61ebc6399 resourceVersion: "43440" uid: cfa68f9e-23be-4734-80f8-c6a9448f68b0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-20T14:59:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9d005f4d-8081-47b8-a91c-8f8b94ddf961"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:59:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:35:35Z" name: gather-dockercfg-ntg6t namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 9d005f4d-8081-47b8-a91c-8f8b94ddf961 resourceVersion: "43246" uid: 535758b9-7f84-4110-b515-75bba441af13 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-20T14:59:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"10d59b21-a842-4e09-bce2-0079aa8001b6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:59:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:35:35Z" name: insights-runtime-extractor-sa-dockercfg-8mlqf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 10d59b21-a842-4e09-bce2-0079aa8001b6 resourceVersion: "43255" uid: a30854bf-4656-4b74-adf0-7b369e5cb154 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T15:05:19Z" service.beta.openshift.io/expiry: "2028-04-19T15:05:19Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 76a2dd3c-cf8c-4ae0-b7da-992a18fc9f38 creationTimestamp: "2026-04-20T15:05:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"76a2dd3c-cf8c-4ae0-b7da-992a18fc9f38"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T15:05:20Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 76a2dd3c-cf8c-4ae0-b7da-992a18fc9f38 resourceVersion: "7971" uid: 2b90bf83-0a92-40dc-a903-ab7a105272ba type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T15:05:13Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 21d3e4f5-b4e2-4ee4-8fe7-51a404c65d86 service.beta.openshift.io/expiry: "2028-04-19T15:05:13Z" creationTimestamp: "2026-04-20T15:05:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"21d3e4f5-b4e2-4ee4-8fe7-51a404c65d86"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T15:05:14Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 21d3e4f5-b4e2-4ee4-8fe7-51a404c65d86 resourceVersion: "7832" uid: e7b6c0a6-c620-4da0-aa33-ffa497083ee8 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-20T14:59:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"87e39539-f02e-498b-af4c-e4b750858008"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T14:59:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T15:35:35Z" name: operator-dockercfg-vt8tc namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 87e39539-f02e-498b-af4c-e4b750858008 resourceVersion: "43253" uid: 74b26cf1-e730-4edf-b05d-a5bfe44461a7 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46725"